|
|
|
|
|
Network Security: A Decision and Game-Theoretic Approach
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of... | | Kali Linux: Wireless Penetration Testing Beginner's Guide
Key Features
-
Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
-
Detect hidden wireless networks and discover their names
-
Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
-
Develop your encryption
... | | Software Similarity and Classification (SpringerBriefs in Computer Science)
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define... |
|
| | | | Security Power ToolsWhat if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security... |
|
Gray Hat Hacking, Second EditionUncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out... | | | | Hacking Exposed Mobile: Security Secrets & Solutions
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Proven security tactics for today's mobile apps,devices, and networks
"A great overview of the new threats created... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |